Cybrary – Advanced Penetration Testing

دوره آزمایشی پیشرفته نفوذ Cybrary – Advanced Penetration Testing، چرخه حیات سایبری را از منظر یک نفوذگر آموزش می دهد. با استفاده از ابزارهای تست نفوذ به طور گسترده ای مورد استفاده قرار می گیرند، ترافیک شبکه را دستکاری می کنند و حملات برنامه های کاربردی وب مانند اسکریپت های  سایت و تزریق SQL را انجام می دهند. در این دوره شما با نحوه تست نفوذ آشنا می شوید.

لینک دانلود دوره پیشرفته تست نفوذ Cybrary – Advanced Penetration Testing

 

حجم : 2.69 گیگابایت

دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم

رمز فايل: technet24.ir

Time: 14 hours 26 minutes
Difficulty: Advanced
Publisher: Cybrary

The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.

Course Description

Penetration testing is one of the most in-demand skill sets of the cybersecurity industry. There are more jobs that require advanced-level hacking than there are people who have the ability to fill them, and this class prepares you to confidently step into one of those roles.

Penetration testing and ethical hacking subject matter expert, published author, and industry event speaker, Georgia Weidman teaches you advanced penetration testing based on her classic book, “Penetration Testing: a Hands-On Introduction to Hacking”.

About this Online Advanced Penetration Testing Training

This course is a deep-dive into the world of advanced pen-testing, and there are no life jackets – only binaries. Real-world unethical hackers are becoming increasingly more devious and cunning when it comes to technology. That means that more advanced level ethical hackers are needed to penetration test and help create more secure networks and systems for our modern, high-security environments. Georgia Weidman, penetration testing and hacking subject matter expert, author, and well-known industry event speaker will teach you everything you need to know!

If you’re looking for a comprehensive introduction to penetration testing, please see we also have our Ethical Hacking and Penetration Testing course.

What Is Involved in this Advanced Penetration Testing Course?

In our online Advanced Penetration Testing training class, you’ll learn how to use advanced techniques and well-known pen-testing tools in more sophisticated ways. You’ll learn to exploit networks using various methods, including SQL injection attacks, cross-site scripting, and local and remote file inclusion while also gaining the knowledge of how to defend the network you are penetrating. You’ll learn how to use social engineering to bypass technology controls and break into a network. You’ll also learn the post-exploitation process, such as how to backdoor SSH logins, enable RDP, and use other data exfiltration techniques.

The Advanced Penetration Testing course has a total clock time of 14 hrs. and 26 mins. and you will receive a certificate of completion upon finishing the course.

Are There Prerequisites for the Advanced Penetration Testing Training?

While there are no prerequisites for this course, it is primarily designed for penetration testers who are looking for more advanced level techniques that will help them better protect high-security organizations. It’s recommended that students are familiar with IT security best practices and have a working knowledge of TCP/IP and common web technologies, including:

  • Windows administration for servers and workstations
  • Linux/ NIX system administration
  • Command-line proficiency on both Windows and NIX systems

They should also have some basic knowledge of the following languages:

  • Python
  • HTML
  • JavaScript
  • SQL
Course Content

Module 1: Linux
Linux (part 1)
1 minute
Linux (part 2) Kali Linux Commands
13m
Linux (part 3) – Directories, myfile and Nano
13m
Linux (part 4) chmod, manipulation and packages
14m
Linux (part 5) IP Addressing and netcat
15m
Linux (part 6) Copy Commands and crontab
5m
Module 2: Programming

2.1Programming (part 1) Fundamentals for Pen Testers
1 minute

2.2Programming (part 2) Bash Scripting and If/Then Command
10m

2.3Programming (part 3) Network Pings
9m

2.4Programming (part 4) Python for Port Scanning
13m

2.5Programming (part 5) Python Import Command
11m
Module 3: Metasploit

3.1Metasploit (part 1) Introduction
1 minute

3.2Metasploit (part 2) Fundamentals
14m

3.3Metasploit (part 3) Operation
24m

3.4Metasploit (part 4) Auxiliary Module
5m

3.5Metasploit (part 5) msfcli
9m

3.6Metasploit (part 6) msfvenom
14m
Module 4: Information Gathering

4.1Information Gathering Intro (part 1)
1 minute

4.2Information Gathering (part 2) Domain Name Services
15m

4.3Information Gathering (part 3) Targeting Email and Maltego
17m

4.4Information Gathering (part 4) recon-ng and google operators
6m

4.5Information Gathering (part 5) NMAP and PortScanning
29m
Module 5: Vulnerability Discovery/Scanning

5.1Vulnerability Scanning Intro (part 1)
1 minute

5.2Vulnerability Scanning (part 2) Nessus
17m

5.3Vulnerability Scanning (part 3) Nmap Scripting Engine
11m

5.4Vulnerability Scanning (part 4) Metasploit
9m

5.5Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto
14m

5.6Vulnerability Scanning (part 6) Directory Transversals
8m
Module 6: Traffic Capture

6.1Traffic Capture Introduction (part 1)
1 minute

6.2Traffic Capture (part 2) Analyzing Network Protocol with Wireshark
7m

6.3Traffic Capture (part 3) Address Resolution Protocol ARP
11m

6.4Traffic Capture (part 4) DNS
5m

6.5Traffic Capture (part 5) ettercap
11m

6.6Traffic Capture (part 6) SSL Stripping
9m
Module 7: Exploitation

7.1Exploitation (part 1) Direct Exploitation
16m

7.2Exploitation (part 2) SQL Commands
14m

7.3Exploitation (part 3) Directory Traversal
6m

7.4Exploitation (part 4) Open Source Vulnerability
6m

7.5Exploitation (part 5) Using Backdoor to Access an FTP Server
6m

7.6Exploitation (part 6) Attaching to an IP Address
6m
Module 8: Passwords

8.1Passwords (part 1) Password Attacks
12m

8.2Passwords (part 2) Online Password Cracking
5m

8.3Passwords (part 3) Offline Password Attacks
12m

8.4Passwords (part 4) Using oclhashcat
17m
Module 9: Advanced Exploitation

9.1Advanced Exploitation (part 1) Introduction
1 minute

9.2Advanced Exploitation (part 2) Client Side Attacks
11m

9.3Advanced Exploitation (part 3) Exploiting Java
6m

9.4Advanced Exploitation (part 4) Social Engineering
23m

9.5Advanced Exploitation (part 5) Bypassing Antivirus Software
18m
Module 10: Post Exploitation

10.1Post Exploitation (part 1) File Transfer without and Interactive Shell
20m

10.2Post Exploitation (part 2) Exploit Development
17m

10.3Post Exploitation (part 3) Pivoting
8m

10.4Post Exploitation (part 4) Setting Up a Domain Controller
13m
Module 11: WebApps

11.1WebApp Introduction (part 1) Web App Testing
1m

11.2WebApp (part 2) Vulnerable Web Applications
11m

11.3WebApp (part 3) SQL Injection
14m

11.4WebApp (part 4) File Inclusion
7m

11.5WebApp (part 5) Cross Site Scripting XSS
8m
Module 12: Exploit Development

12.1Exploit Development Introduction (part 1)
1 minute

12.2Exploit Development (part 2) A Program in Memory
10m

12.3Exploit Development (part 3) Stack Frame for Function
5m

12.4Exploit Development (part 4) GNU Compilers
19m

12.5Exploit Development (part 5) Python
8m

12.6Exploit Development (part 6) Executing Unintended Code
14m

12.7Exploit Development (part 7) Network Based Exploits and Debuggers
15m

12.8Exploit Development (part 8) Creating a Cyclic Pattern
17m

12.9Exploit Development (part 9) Verifying Offsets
17m

12.10Exploit Development (part 10) Creating Shell Code in Kali Linux
16m

12.11Exploit Development (part 11) Fuzzing
17m

12.12Exploit Development (part 12) Public Exploits and Perl
12m

12.13Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module
16m

12.14Exploit Development (part 14) Structured Exception Handler Over-Write
34m
Module 13: Smartphone Pentest Framework

13.1SPF Introduction (part 1)
1m

13.2SPF (part 2) Attach to Smartphone Based Apps
3m

13.3SPF (part 3) Turning an Android App into a SPF Agent
8m

13.4SPF (part 4) Functionality for Agents
8m

13.5SPF (part 5) Pentesting Mobile Devices
14m

دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.